Ph1004 Lab1 Report

In: Science

Submitted By qwer3200
Words 1234
Pages 5
PH1004 Experiment 1

One Dimensional Motion

Name: Jin Cai

Student ID: 0392789

Partner: Kai Lan

Section: G1

Date Experiment Performed: Jan 29th

Date Experiment Due: Feb 5th

Introduction:

(This should be in paragraph form and should explain the objective and the related theory. For example, what is the overall objective of the experiment, and what are you going to measure to accomplish it? The Introduction should not exceed one page.)

The objective of the experiment is to understand the meaning of displacement, average velocity, instantaneous velocity, average acceleration and instantaneous in one-dimensional motion. The first experiment was to calculate the average and instantaneous velocity. We first positioned the air track as described in the experiment manual. Then we put the photogate G1 on the 40cm mark, the photogate G3 on the 170cm mark, the photegate G2 on the 110cm mark and let them parallel to the air track. We called them xG1, xG2, and xG3. Next, we calculated the delta x is 130cm. Then we began to record the position of the right edge of the glider on the air track when it was blocked and unblocked, xb and xub. These two parameters meant the uncertainty in the experiments is as same as that for the xG1 and xG2. The xb is 45.53cm and xub is 48cm. We inputted these data to the computer. Then we put the glider to make it contact with the electro-magnet, and opened the software-controlled switch to do the measurement. The second experiment was to calculate the average acceleration. We first put the photogate G2 away. We let the flag parallel to the air track. We twisted the string of the hanging mass with the glider. We adjusted the position of G1 and G3. The delta x between G1 and G3 is 60cm. Next, we recorded the initial position, xinitial in the measurement window. We turned on the software-controlled switch to do the…...

Similar Documents

Report

...Chapter-1 Introduction of the report 1.1 Origin of the report Reporting means the written presentation of the evidence and findings of a research. After completion of the internship program report submission is essential. The report is based on a topic that can satisfy both organization and my academic institution. Internship is the last part of my BBA course. Being a BBA student internship and report submission is essential for me. Without completion of internship and submission of report I cannot be able to complete my BBA course. This report is submitted to my internship supervisor, Shishir K. Rouph, Visiting Faculty, University Of Development Alternative, after completion of the three months internship program in the BASIC Bank Limited ( Bangshal Branch). I have assigned a topic “Credit Operating Procedure of BASIC Bank Ltd.” and the BASIC Bank authority gave me the opportunity to work at the Bangshal Branch for three months on the topic. 1.2 Rationale of the Study In the later 19th century, finance was a part of the Economics. But due to the globalization and more expansion of international trade, Finance plays the major role for the economic development. The development of a modern economy would not have been possible without the use of money. Bank is an important and essential financial institution for the necessity of the use of money and the protection of money. Due to the globalization and technological innovation, banking business has......

Words: 10106 - Pages: 41

Lab1

...ping. Does an intense scan mithout checking to see if targets are up first. This can be useful when a target seems to ignore usual discovery probes. Ping scan. This scan only finds which targets are up and does not port scan them. Quick scan. This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports. quick scan plus. A quick scan plus OS and version detection Assessment Worksheet 7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after 17 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) reviewing the scan report. OS detection, version detection, script scanning, port scanning. ARP ping, ICMP ping, ACK ping SYN ping. 8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. OS detection: discovers OS type running on the targeted hosts, version, updates, patches Script scanning: execute scripts either customized by the user or the ones selected for each profile. Port scanning: checks the port status as open, closed, filtered, unfiltered. ARP ping: it testes whether an IP address is in use on the local network, and can get additional information about the device using that address. ICMP ping: echo request check for connectivity. ACK/SYN ping: port scanner that generates raw IP packets and receives an ACK 9. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI......

Words: 786 - Pages: 4

Reports

...Key Performance Indicators (000' Tk.) ( Tk./ Share) (Tk.) (000' Tk.) Shareholders' Equity Market Price of Share Earning Per Share Turnover (000' Tk.) (000' Tk.) (000' Tk.) Gross Profit Operating Profit Net Profit Annual Report 2008-2009 Page 19 Five Years At a Glance Financial Position: Authorized Capital Paid up Share Capital Reserves and Surplus Shareholders' Equity Total Assets Fixed Assets - Cost Fixed Assets - Carrying Value Net Working Capital Net Profit for the year 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk 000'Tk. % % % Tk. Tk. Times Times Days Tk. % Tk. Tk. % Times No. No. No. 2008-2009 200,000 178,678 13,751 192,429 414,511 444,476 286,756 (2,406) 855 150,725 18.23% 8.90% 0.57% 0.48 5.00 0.98 : 1 1.95 142.46 54:46 0.21% 107.70 124 4.03% 0.87 1,786,780 4,265 278 2007-2008 200,000 178,678 21,830 200,508 360,995 382,890 239,201 (5,355) 97 168,672 19.36% 9.97% 0.06% 0.05 5.00 0.96 : 1 2.79 112.54 44:56 0.03% 112.22 53.00 9.43% 2.12 1,786,780 4,392 274 2006-2007 200,000 178,678 (3,317) 175,361 315,368 322,343 161,902 8,334 (7,842) 151,581 13.77% 4.75% (5.17%) (4.39) 1.08 : 1 2.75 127.17 44:56 (2.49%) 98.14 35.25 2.78 1,786,780 4,539 229 2005-2006 200,000 178,678 (4,525) 183,203 326,168 309,367 165,924 (9,511) (8,693) 149,197 15.60 % 5.73% (5.83%) (4.87) 5.00 0.93:1 1.96 153.90 44:56 (2.67%) 102.53 55.00 9.09% 1.86 1,786,780 4,645 230 2004-2005 200,000 178,678 22,151 200,829 366,821 309,367 183,029......

Words: 1593 - Pages: 7

Lab1

...to the IP source? 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fi elds in the ICMP echo-request/echo-replies vary? 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? 6. Name at least fi ve different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. 16 LAB #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 1 7. How many different tests (i.e., scripts) did your “Intense Scan” defi nition perform? List them all after reviewing the scan report. 8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. 9. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) fi nd on the network? 10. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you perform on the VSCL target machines? Assessment Worksheet 17...

Words: 440 - Pages: 2

Lab1

... yes, 4 4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24 5. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. Intense Ping Quick Regular Quick Traceroute 38351_LB01_Pass2.indd 16 26/02/13 11:43 PM Assessment Worksheet 6. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after 17 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) reviewing the scan report. 36 7. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. searching for open ports 8. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) find on the network? 6 9. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you perform on the VSCL target machines? check for vulnerbilities 38351_LB01_Pass2.indd 17 26/02/13 11:43 PM 38351_LB01_Pass2.indd 18 26/02/13 11:43 PM ...

Words: 548 - Pages: 3

Lab1

...iLab #2 - Ecosystems, Biodiversity, and Species March 10, 2014 SCI 204 iLab #2 - Ecosystems, Biodiversity, and Species Exercise #1- Discuss the producer, consumer and decomposer relationships in this ecosystem after the eruption. List 3 references. After the forests were destroyed by lava and mudflow, producers were completely destroyed and died out. This caused a disruption in the food cycle because then, consumers such as deer had less food supply causing them to starve and die. After a while, the decomposers begin to kick start the cycle for new life, bringing back order. Exercise #2- Discuss any two plant species and any two animal species that are affecting the Everglades. What are the challenges facing the native species and how are they adapting to the changing environment? List 3 references. Plants – Australian pine- This plant was brought over to the Everglades and used for landscaping purposes from South pacific Islands and Australia. The tree’s roots disrupt the nesting of the native creatures such as the American crocs and turtles. Brazilian pepper plant- This pepper tree was brought over from Brazil to market the peppers. As birds ate the seeds, they begin to spread them from their feces. As these trees begin to spread throughout the Everglade, its dense structure allowed it to form concentrated thickets......

Words: 683 - Pages: 3

Lab1

...infrared ports and built-in video cameras and microphones, whereas these devices are add-ons for desktop computers. Recommended Procedures Task 1: Procedure 1. Draw the von Neumann model of a computer. 2. Provide definitions for each part of the von Neumann model. 3 Task 2: Procedure 1. Provide at least two examples of input, output, and memory devices found in a typical computer. 2. Provide an example of a device that is both an input and output device. Task 3: Procedure 1. Provide a comparison table showing the similarities and differences between Desktop and notebook computers. Deliverables Your lab report will be a Microsoft Word document containing descriptions of the results obtained in each step of the procedure for each task, including relevant tables and diagrams. Include any paper or pencil diagrams with your document submission. Your report should be two to four pages long. Include a header containing your name and the date on each page. Name the document StudentName_Lab1.doc, replacing StudentName with your name. For example, Sue Jones would name the document SueJones_Lab1.doc. Use Arial 12-point font and double line spacing. Self-Assessment Checklist I have reviewed the von Neumann material in Chapter 1. I have reviewed the different type of computers described in Chapter 1. I have followed the submission requirements: File Format: Length: Font: Line Spacing: Microsoft Word (.doc /.docx) 2-4 pages Arial 12-point Double    4 ...

Words: 765 - Pages: 4

Lab1

...any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t. An attacker will leave some sort of backdoor into the system. This allows for re-entry at a later time that doesnt appear in scans by the company As the security professional your job is to find holes in the system, I believe that you definately note the issue found and continue testing for other issues in the system. While testing for more holes I feel that you must report you rcurrent findings to the company so that they may close off that hole. You would definately want to to know that if someone gets past that line of security if there is anything else they could penetrate NIST Publication 800-42 10. Planning, Discovery, Attack, Report 11. A company would conduct an internal penetration test to check and make sure that a disgruntled employee or any other employee for that matter could not get access to any information that they should not have access to. 12. There are guidelines for penetration testers to follow if they get close to breaking these guidlines they should stop as to not break the trust or laws implicated with the guidlines of the company. 13. A company would hire outside consulting firm without the IT departments knowledge so that the company could see how the IT department reacts to the intrusion and how...

Words: 442 - Pages: 2

Nt1430 Lab1

...quit less.) 8. n/a 9. a Which ls option sorts the output by modification time? ls -lt /etc b. Which head option displays the first 5 lines of a file instead of the default 10 lines? head -n 5 /etc/passwd c. Which tail option continues to display a file as additional content is added to the file (such as watching a log file)? (Hint: Search for follow.) tail -f /var/log/messages d. Which cal option displays three months instead of the default current month? cal -3 e. Use whatis to see which man pages relate to passwd. whatis passwd f. Display the man page for the file named passwd (not the utility). man 5 passwd g. Use man -k (apropos) to find a utility that shows who is logged in on the system. man -k who h. Which command reports on free disk space? (Tip: When you want to search for a string with a space, put quotation marks around it: "disk space".) man -k "disk space" df i. The end of the man page for df has a SEE ALSO referencing info. Explore the df info page. info coreutils 'df invocation' 10. n/a...

Words: 470 - Pages: 2

Lab1

...October 6, 2014 Unit 2 Analysis 1, NT1110 Computer Shopper Computer Type | Price | RAM | Hard Drive | Processor Speed | Cyber Power PC Gamer Ultra GUA880 Desktop | $571.99 | 8 Giga Bytes | 1024 Giga Bytes | 3.8 Giga Hertz (4 Mega Bytes Cache) | Dell Inspiron i3646-1000 BLK Desktop | $249.99 | 4 Giga Bytes | 500 Giga Bytes | 2.41 Giga Hertz | Acer C720 Chromebook | $199.00 | 2 Giga Bytes | 32 Giga Bytes | 1.4 Giga Hertz | HP 15-g070nr 15.6-inch Laptop | $249.99 | 4 Giga Bytes | 500 Giga Bytes | 1.35 Giga Hertz | Gamers would most likely prefer the Cyber Power PC Gamer Ultra GUA880 Desktop. Cause for one you need a high processor speed to be able to run games so they don’t lag. You also need a lot of memory on your hard drive to be able to download games because they take a lot of memory. An on top of that whenever updates come out it can possibly make the size of the game bigger depending on how major the update is. Also you need a descent amount of RAM cause not only does it help save memory but it helps with how fast your game will download. Lastly it’s a lot cheaper than some of the bigger brands of the gamer desktops especially with the 1024 Giga Byte hard drive. Cause there are more expensive gamer desktops with less memory on its hard drive than this one. Business owners would prefer the HP 15- g070nr 15.6- inch Laptop. Especially if they go on business trips for meetings because you have more than enough memory on your hard drive to be able......

Words: 402 - Pages: 2

Report

...Prepared By: Muhammad Yasir Internship Report, 2013 In The Name of ALLAH, The Compassionate, The Merciful KASBIT University Page 1 of 32 Prepared By: Muhammad Yasir Internship Report, 2013 DEDICATION “The Holly Prophet Mohammad (PBUH) from where all systems and standards for quality can be downloaded directly, which are applicable everywhere; from daily life to the dynamically changing business environment”. & “My Dear parents and Teachers who taught me the true meaning of life” KASBIT University Page 2 of 32 Prepared By: Muhammad Yasir Internship Report, 2013 ACKNOWLEDGEMENT First of all, I want to express all my humble thanks to ALLAH who is very sensitive about each and every activity of all his men and without whose help, I am unable to accomplish any objective in my life. All respect to his Holy Prophet HAZART MUHAMMAD (Peace Be Upon Him) who brought the light of knowledge when the humanity was wandering in the desert of ignorance. Secondly, I am grateful to my prestigious institute that made his learning opportunity a part of our education, especially. Internship coordinator who not only guided me well but also helped me in finding such an excellent place for internship I am also thankful to all other teachers as the knowledge imparted by them enables me to gain knowledge of the organization in best way. I would also thank to all the staff of MCB Bank, particularly Mr. Syed Azhar Mr. Anus, Mr. Naeem and Mr. Mansoor who gives me an......

Words: 6437 - Pages: 26

Nt2580 Lab1

...Investigator? * WireShark offers a deep dive into individual packets. 4. Why is it important to select the student interface in the Wireshark? * It allows you to the student lab environment. 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? * Nmap –T4 –A –v 172.30.0.0/24 6. Name at least five different scans that may be performed with Zenmap. * Intase * Ping * Quick * Requiar * Quick Scan plus 7. How many different tests (i.e., scripts) did your Intense Scan perform? * 6 tests 8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report. * The intense scan shows all host that are in the network, what they are running and even what firewalls they use. 9. How many total IP hosts did Zenmap find on the network? * 256 Addresses...

Words: 332 - Pages: 2

Report

...BUSINESS & ECONOMICS MEB University Assessment Task: Research Report Green marketing: How The Body Shop Australia applies it by Lucy Wang November 2014 Course: Monash University English Language Bridging Program for University Teachers: A. Smith & M. Webb BUSINESS & ECONOMICS Table of Contents Executive Summary ……………………………………………………………………………………………………………….ii 1. Introduction……………………………………………………………………………………………………………………….3 2. Green Marketing………………………………………………………………………………………………………………..3 2.1. The four Ps of Marketing …………………………………………………………………………………………………….3 3. The Body Shop Strategy ……………………………………………………………………………………………………..4 3.1. Product Policy……………………………………………………………………………………………………………………..4 3.2. Price Policy…………………………………………………………………………………………………………………………..5 3.3. Placement Policy ………………………………………………………………………………………………………………….6 3.4. Promotion Policy ………………………………………………………………………………………………………………….6 4. Conclusions and Recommendations…………………………………………………………………………………….7 5. References ………………………………………………………………………………………………………………………….8 List of Figures Figure 1: The Body Shop Green Products……………………………………………………………………………………..5 Figure 2: Green Planet Campaign by The Body Shop …………………………………………………………………….7 i BUSINESS & ECONOMICS Executive Summary This report analyses how The Body Shop Australia applies green marketing, using four of the elements of the marketing mix, including product, price, promotion and place. The findings indicate that the company is......

Words: 2247 - Pages: 9

Lab1

...The way you present yourself in the classroom makes an impression on your instructor and your classmates. Do you present yourself as a serious, dedicated student, or do you come off as uninterested or maybe even disruptive? As a college student, you are expected to act in a mature manner. Below is a list of Do’s and Don’ts for the college classroom that will help facilitate a learning centered atmosphere: Take responsibility for your education Instructors are here to create a learning environment – whether or not you learn depends on your willingness to listen, ask appropriate questions, and do the work necessary to pass the course. Attend class Students who attend class, listen to the instructor, ask questions, and take good notes are more likely to pass with a higher grade. If you must miss a class, contact your instructor ahead of time to let him or her know that you will not be in class. DO NOT ask the instructor to repeat material you missed because you skipped a class. Be on time Walking in late disturbs everyone. At this college and many places of employment, tardiness communicates lack of interest and lack of dependability. If you cannot avoid being late, make sure to be unobtrusive about your entry. Come to class prepared – turn your work in on time Complete assigned reading before coming to class. Make sure to bring common classroom supplies such as a pencil, paper, textbook, test materials, etc. along with completed homework. Students who......

Words: 366 - Pages: 2

Sci103 Lab1

...Name: Vannessa Watkins Date: 04/09/2016 Instructor’s Name: Kenneth Gordon Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6.5 |Neutral |Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |11.5 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use...

Words: 675 - Pages: 3